Skip to content
Snippets Groups Projects
  1. Oct 05, 2023
    • Eric Blake's avatar
      nbd/client: Request extended headers during negotiation · 56cf9d04
      Eric Blake authored
      
      All the pieces are in place for a client to finally request extended
      headers.  Note that we must not request extended headers when qemu-nbd
      is used to connect to the kernel module (as nbd.ko does not expect
      them, but expects us to do the negotiation in userspace before handing
      the socket over to the kernel), but there is no harm in all other
      clients requesting them.
      
      Extended headers are not essential to the information collected during
      'qemu-nbd --list', but probing for it gives us one more piece of
      information in that output.  Update the iotests affected by the new
      line of output.
      
      Signed-off-by: default avatarEric Blake <eblake@redhat.com>
      Reviewed-by: default avatarVladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
      Message-ID: <20230925192229.3186470-23-eblake@redhat.com>
      56cf9d04
  2. Sep 22, 2023
    • Eric Blake's avatar
      nbd: Replace bool structured_reply with mode enum · ac132d05
      Eric Blake authored
      
      The upcoming patches for 64-bit extensions requires various points in
      the protocol to make decisions based on what was negotiated.  While we
      could easily add a 'bool extended_headers' alongside the existing
      'bool structured_reply', this does not scale well if more modes are
      added in the future.  Better is to expose the mode enum added in the
      recent commit bfe04d0a out to a wider use in the code base.
      
      Where the code previously checked for structured_reply being set or
      clear, it now prefers checking for an inequality; this works because
      the nodes are in a continuum of increasing abilities, and allows us to
      touch fewer places if we ever insert other modes in the middle of the
      enum.  There should be no semantic change in this patch.
      
      Signed-off-by: default avatarEric Blake <eblake@redhat.com>
      Message-ID: <20230829175826.377251-20-eblake@redhat.com>
      Reviewed-by: default avatarVladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
      ac132d05
  3. Sep 08, 2023
  4. Jun 05, 2023
  5. Jan 20, 2023
    • Markus Armbruster's avatar
      coroutine: Split qemu/coroutine-core.h off qemu/coroutine.h · 68ba85ce
      Markus Armbruster authored
      
      qemu/coroutine.h and qemu/lockable.h include each other.
      
      They need each other only in macro expansions, so we could simply drop
      both inclusions to break the loop, and add suitable includes to files
      that expand the macros.
      
      Instead, move a part of qemu/coroutine.h to new qemu/coroutine-core.h
      so that qemu/coroutine-core.h doesn't need qemu/lockable.h, and
      qemu/lockable.h only needs qemu/coroutine-core.h.  Result:
      qemu/coroutine.h includes qemu/lockable.h includes
      qemu/coroutine-core.h.
      
      Signed-off-by: default avatarMarkus Armbruster <armbru@redhat.com>
      Message-Id: <20221221131435.3851212-5-armbru@redhat.com>
      [Semantic rebase conflict with 7c10cb38 "accel/tcg: Add debuginfo
      support" resolved]
      68ba85ce
  6. Jun 29, 2022
  7. Mar 07, 2022
    • Daniel P. Berrangé's avatar
      block: pass desired TLS hostname through from block driver client · 046f98d0
      Daniel P. Berrangé authored
      
      In
      
        commit a71d597b
        Author: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
        Date:   Thu Jun 10 13:08:00 2021 +0300
      
          block/nbd: reuse nbd_co_do_establish_connection() in nbd_open()
      
      the use of the 'hostname' field from the BDRVNBDState struct was
      lost, and 'nbd_connect' just hardcoded it to match the IP socket
      address. This was a harmless bug at the time since we block use
      with anything other than IP sockets.
      
      Shortly though, we want to allow the caller to override the hostname
      used in the TLS certificate checks. This is to allow for TLS
      when doing port forwarding or tunneling. Thus we need to reinstate
      the passing along of the 'hostname'.
      
      Reviewed-by: default avatarEric Blake <eblake@redhat.com>
      Signed-off-by: default avatarDaniel P. Berrangé <berrange@redhat.com>
      Message-Id: <20220304193610.3293146-3-berrange@redhat.com>
      Signed-off-by: default avatarEric Blake <eblake@redhat.com>
      046f98d0
  8. Dec 21, 2021
  9. Sep 29, 2021
  10. Jun 18, 2021
Loading